Do We Need a New Network Management Framework? David Harrington IETF66 OPS Area Meeting Montreal, Quebec, Canada.

Slides:



Advertisements
Similar presentations
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec Title: Initiate An Exercise for Generating a 21a Document Date Submitted: September 21, 2009.
Advertisements

External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
Chapter 19: Network Management Business Data Communications, 5e.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Network Management: SNMP.
1 IBM SanFrancisco Product Evaluation Negotiated Option Presentation By Les Beckford May 2001.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
NS-H /11041 SNMP. NS-H /11042 Outline Basic Concepts of SNMP SNMPv1 Community Facility SNMPv3 Recommended Reading and WEB Sites.
XCON architecture and protocol musings Henning Schulzrinne Columbia University.
COMP4690, by Dr Xiaowen Chu, HKBU
Network Management Complexities Dan Romascanu (Contributed in discussions by Andy Bierman, David Harrington, Juergen Schoenwealder) IESG Retreat Boston,
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
SNMP Simple Network Management Protocol
Integrated Security Model for SNMPv3 (ISMS) pronounced "is" "miss" David T. Perkins & Wes Hardaker 60 th IETF August 6, 2004.
SNMPv3 Yen-Cheng Chen Department of Information Management National Chi Nan University
Session-based Security Model for SNMPv3 (SNMPv3/SBSM) David T. Perkins Wes Hardaker IETF November 12, 2003.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
System Design/Implementation and Support for Build 2 PDS Management Council Face-to-Face Mountain View, CA Nov 30 - Dec 1, 2011 Sean Hardman.
Network Protocols UNIT IV – NETWORK MANAGEMENT FUNDAMENTALS.
SNMP ( Simple Network Management Protocol ) based Network Management.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse 2.
Report of ETSI NGN IPTV activities Rainer Münch, TISPAN Chairman Presenter: Ian Spiers DOCUMENT #:GSC13-PLEN-56 FOR:Presentation SOURCE:Rainer Münch, Ian.
Ops Area Discussion Management Interface Refinement Thomas Nadeau Dan Romascanu IETF 84 - Vancouver 1.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
1 Introduction to Internet Network Management Mi-Jung Choi Dept. of Computer Science KNU
1 © 1999 BMC SOFTWARE, INC. 2/10/00 SNMP Simple Network Management Protocol.
An Introduction to Software Architecture
SMI to XSD Translations IETF70 David Harrington. Agenda The Need The Approaches Comparisons.
Abierman-nanog-30may03 1 XML Router Configs BOF Operator Involvement Andy Bierman
© Hitachi, Ltd All rights reserved. NETCONF Configuration I/F Advertisement by WSDL and XSD Hideki Okita, Tomoyuki Iijima, Yoshifumi Atarashi, Ray.
Introduction of PRO WG activities Group Name: TP Source: Shingo Fujimoto, FUJITSU, Meeting Date: Agenda Item:
Abierman-netconf-mar03 1 NETCONF BOF 56th IETF San Francisco, California March 17, 2003 Discussion: Admin:
Slide 1 SNMPv3, SSH & Cisco Matthew G. Marsh Chief Scientist of the NEbraskaCERT.
Network Management Security
68th IETF – OPS area – XML MIB Modules XML MIB Modules draft-stephan-ops-xml-mib-module-template-00 draft-stephan-ops-xml-mib-module-template-00.
Ocean Observatories Initiative Data Management (DM) Subsystem Overview Michael Meisinger September 29, 2009.
Internet Standard Management Framework
SNMPv3 1.DESIGN REQUIREMENTS 2.BIRTH & FEATURES of SNMPv3 3.ARCHITECTURE 4.SECURE COMMUNICATION - USER SECURITY MODEL (USM) 5. ACCESS CONTROL - VIEW BASED.
International Telecommunication Union ITU Seminar on the Standardization and ICT development for the Information Society Uzbekistan, 6-8 October 2003 Network.
PG 1 Netconf Data Model Netmod BOF – IETF 60 Sharon Chisholm – Randy Presuhn -
XML Schema for Accessing SMIv2 Data Models IETF69 Chicago BOF David Harrington.
Network Management Security
S imple O bject A ccess P rotocol Karthikeyan Chandrasekaran & Nandakumar Padmanabhan.
Guidance of Using Unique Local Addresses draft-liu-v6ops-ula-usage-analysis-05 draft-liu-v6ops-ula-usage-analysis-05 Bing Liu(speaker), Sheng Jiang, Cameron.
Representing Netconf Data Models using Document Schema Definition Languages (DSDL) Rohan Mahy Sharon Chisholm Lada Lhotka IETF 72 - Dublin.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
ISMS IETF72 David Harrington. Status IETF72 Transport Subsystem for the Simple Network Management Protocol (SNMP) –IETF69: draft-ietf-isms-tmsm-09.txt.
SSHSM Issues David Harrington IETF64 ISMS WG Vancouver, BC.
Design Guidelines Thursday July 26, 2007 Bernard Aboba IETF 69 Chicago, IL.
Presentation at ISMS WG Meeting1 ISMS – March 2005 IETF David T. Perkins.
Netconf Event Notifications IETF 66 Sharon Chisholm Hector Trevino
1 Steve Hughes Daniel J. Crichton NASA/JPL January 16, 2007 CCSDS Information Architecture Working.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Netmod Netconf Data Modeling Sharon Chisholm Nortel
Convergence of Network Management Protocols
56th IETF syslog WG Chair: Chris Lonvick
Introduction to Internet Network Management
NETCONF Configuration I/F Advertisement by WSDL and XSD
Sharon Chisholm Netconf Phase 2 Musing Sharon Chisholm
IETF68 Mini-BOF MIB-Doctor-Sponsored MIB Document Templates
Chapter 8: Monitoring the Network
SNMP (Simple Network Management Protocol) based Network Management
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Web-based Imaging Management System Working Group - WIMS
Chapter 5 SNMP Management
Chapter 5 SNMP Management
Network Management Security
Presentation transcript:

Do We Need a New Network Management Framework? David Harrington IETF66 OPS Area Meeting Montreal, Quebec, Canada

Purpose of the Presentation There has been increasing discussion about whether the existing IETF-Standard Management Framework needs to be modified to better meet the emerging needs of the Internet. This presentation is designed to expand the discussion to a larger audience and focus the discussion so solutions can be researched and engineered.

The IETF-Standard Management Framework The Established Concepts

An Overview Identify the concepts that underlie the existing IETF-Standard Management Framework Establish a common terminology for discussing the evolution of the existing IETF-Standard Management Framework

Concepts Four Components of a System several managed nodes –each with entity to provide remote access to management instrumentation Management applications –Possibly multiple applications A protocol over standard transport Management information

Concepts The Modular Architecture of the IETF Management Framework a data definition language (SMI) definitions of management information (The MIB) a protocol definition (SNMP) security and administration (SNMPv3)

Concepts Data Definition Language - SMI Mechanism to address data instances –Tree-shaped space with tag assigned to each object instance Standard external representation of the value (BER) definition of the meaning, or semantics of a value (MIB Module document)

Concepts Definitions of Management Information The MIB contains MIB modules MIB module defines content specific to managed functionality Experience has shown that MIB modules are preferred over one monolithic MIB definition (e.g. MIB-I and MIB-II) to enable easier updates to a system and standards

Concepts A Protocol Definition Currently SNMP is the recommended protocol for use in the IETF standard management framework SNMPv1 protocol defined transport mapping, message format, operations, naming scope, weak authentication, weak authorization SNMPv1/v2c aspects not very modular

Concepts Security and Administration RFC3411 added stronger authentication, message security, and authorization. Added remote administration of SNMP Modularized the internal structure of an SNMP entity by identifying data flows and using different MIB modules for different aspects

Concepts Modularity: Subsystems and Models –Subsystems have “service interfaces” to identify data flows between subsystems –A Model instantiates a subsystem –Multiple models can co-exist within a subsystem

Concepts Multiple models can co-exist within a subsystem –transports (UDP/IPv4, UDP/IPv6, TCP, SSH) –message formats (v1, v2c, v3) –security models (Community, USM, SSH) –Internal applications (command generator, command responder, notification originator, notification receiver, proxy) –access control models (VACM, others)

Concepts Some mandatory-to-implement models per subsystem for interoperability –transports (UDP/IPv4, TCP, SSH) –message formats (v1, v2c, v3) –security models (Community, USM, SSH) –Internal applications (command generator, command responder, notification originator, notification receiver, proxy) –access control models (VACM, others)

Concepts Subsystems –Transport Mapping –Message Format –Message Security –Applications –Authorization Major bindings between subsystems –Security Principal, Model, Level –Classes of Operations (read/write/notify)

Convergence of IETF Network Management Protocols Work Being Done, and Done, and Done

Purpose of the Presentation Describe some efforts under way so contributors are aware of how their work fits into the IETF-Standard Management Framework Make contributors aware of options being considered in similar problem spaces. Make contributors aware of duplication of effort

Purpose of the Presentation At IETF64, I did a full presentation about the Convergence of NM efforts in the IETF and recommended improved integration and reuse of related work Here is a brief recap of that presentation. For the complete presentation, consult the proceedings and streaming audio archive.

Message Security + Transport Protocol Content Modeling Language Authorization Operations Message Security Transport SNMP/ISMS MIBs SMIv2 VACM/RADIUS Get-*/SET USM->SSH UDP->TCP Netconf TBD XML Schema TBD GET/EDIT SSH TCP Syslog Not Standard Structured ASCII none SSH or TLS? UDP->TCP?

Operations Protocol Content Modeling Language Authorization Operations Message Security Transport ISMS MIBs SMIv2 VACM/RADIUS GET*/Set/Notify USM->SSH UDP->TCP Netconf TBD XML Schema TBD GET/EDIT/Notify SSH TCP Syslog Not Standard Structured ASCII Log/Notify SSH or TLS UDP->TCP

Operation Authorization Protocol Content Modeling Language Authorization Operations Message Security Transport ISMS MIBs SMIv2 RADIUS/VACM GET-*/SET SSH UDP->TCP Netconf TBD XML Schema All-or-nothing GET/EDIT SSH TCP Syslog Not Standard Structured ASCII All-or-nothing none SSH or TLS? UDP->TCP

Data Modeling Language Protocol Content Modeling Language Authorization Operations Message Security Transport ISMS MIBs SMIv2 RADIUS GET-*/SET SSH UDP->TCP Netconf TBD XML Schema TBD GET/EDIT SSH TCP Syslog Not Standard Structured ASCII SSH or TLS UDP->TCP

Data Modeling Protocol Content Modeling Language Authorization Operations Message Security Transport ISMS MIBs SMIv2 RADIUS GET-*/SET SSH UDP->TCP Netconf TBD XML Schema TBD GET/EDIT SSH TCP Syslog Not Standard Structured ASCII SSH or TLS UDP->TCP

Proposal to Develop a Modular Framework to Include IPFIX, Netconf, SNMP, and Syslog Focus on Bringing The Work Together

Proposal Start with the RFC3411 subsystems –Other protocols do not have modular architectures –RFC3411 is a fuller architecture than others, and has been reviewed and approved by Security area. –Some aspects of RFC3411 are not needed by other protocols, but will be needed by some

Proposal RFC3411 has known problems A New architecture should be developed –Should probably use a layered architecture –Should show data flows pictorially –Should eliminate ASIs, which are frequently confused as being APIs We should replace RFC3411 with a common architecture.

Start with these Subsystems –Transport Mapping –Message Format –Message Security –Applications –Authorization Other work is being broken into secure transport, protocol, data modeling, etc.

Start with these Major bindings between subsystems –Security Principal, Model, Level –Classes of Operations (read/write/notify) –An instance addressing mechanism These are used to provide model- independent handles between authenticated principal, operations, and data object instances or hierarchies

Retro-fit Determine how portions of existing protocols fit into the modular architecture Consider how difficult it would be to develop a modular “model” to separate the feature from the rest of the protocol design, similar to transport mappings

Retro-fit Determine how portions of existing protocols do NOT fit into the modular architecture Determine where the concepts conflict to the point they cannot fit in the modular architecture Determine how the architecture should be changed to accommodate the conflict

Proposal to Collaborate on the Ongoing Work of Evolving the IETF Management Framework

Basic Premise Network Management used to be an unusual problem because the database was remote from the processing application This is no longer a unique type of application. Therefore, Network Management should be considered just another application.

Basic Premise Network Management Security used to be a low priority, and different NM protocols could use different security approaches. This is no longer a low priority, and compatibility of solutions is critical. Network Management should be considered just another application that needs to run over a secure transport, but with a few unique issues.

Convergence NM solutions need to address –Secure NM Transport –Information Modeling Language –Data Modeling –Classes of Operations –Applications –Authorization

Secure NM Transport WGs are striving to integrate Network Management protocols with existing security solutions Having a “balanced” security approach between NM protocols would provide a more secure NM environment. NM work has identified specific issues to address regarding using lower layer security.

Secure NM Transport The Security Area is already working on defining how applications (generic) should utilize lower layer security. OPS, Application, and Security Areas should standardize data flows between applications and secure transport Then identify common threat models for NM and common solution models

Secure NM Transport Recommend a Security WG effort to develop one (subsystem-style) strategy for NM solutions to use lower layer security Different models for different needs Bring contributors from syslog, netconf, ipfix, and snmpv3 together with contributors from TLS, SSH, BEEP, SASL, etc. to discuss NM requirements and design standard solution models.

Convergence NM solutions need to address –Secure NM Transport –Information Modeling Language –Data Modeling –Classes of Operations –Applications –Authorization

Information Models IETF has no standard language for information modeling, except ASCII. It would be very helpful if WGs defined an information model about what can and should be managed, before committing the design to a data model, such as a MIB module.

NM Information Models WGs should be required to develop an information model module to describe the management needs of their technology In keeping with the lessons already learned, the information models should be developed from the bottom-up in modular fashion, by the technology creators, rather than as a monolithic information model by info-model designers.

NM Data Models The IETF should develop a common ASCII-RFC-based data-modeling language with an eye toward sharing netconf, syslog, ipfix, and snmp information models WGs should develop a data model (e.g., a MIB module) for their technology as proof of concept of their information model.

Data modeling languages The collections of management data used by snmp, syslog, ipfix, and netconf are databases. Information modeling and data modeling are simply aspects of database modeling There should be collaboration between the Application Area and the OPS Area to develop information modeling language standards, suitable for use in NM.

Data modeling languages Migrating from one data modeling language to another, or supplementing one form of data model with another will require tools. The NMRG has done significant research on migrating from SMIv2 MIB modules to other data models from the same information model. There should be collaboration between the NMRG and the OPS Area to develop tools, suitable for use in migrating between NM data models.

Possible Convergence Work Protocol Content Modeling Language Authorization Operations Message Security Transport SNMP/ISMS MIB models--  SMIv2 RADIUS/AAA Get-*/SET  SSH UDP->TCP Netconf XML XML Schema AAA GET/EDIT SSH TCP Syslog <--Standardize Structured ASCII SSH or TLS? UDP->TCP?

Questions? Thank you